Linux Security
Linux Security
Linux Security

Fedora 32: 389-ds-base 2021-dc1a4934a5

Date 04 Mar 2021
191
Posted By LinuxSecurity Advisories
- 389-ds fixes an information disclosure during unsuccessful LDAP BIND operation, CVE-2020-35518 - Dogtag PKI adopted to work with 389-ds with the fix - FreeIPA rebuilt to require new Dogtag and 389-ds versions
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2021-dc1a4934a5
2021-03-04 19:56:07.300277
--------------------------------------------------------------------------------

Name        : 389-ds-base
Product     : Fedora 32
Version     : 1.4.3.20
Release     : 2.fc32
URL         : https://www.port389.org
Summary     : 389 Directory Server (base)
Description :
389 Directory Server is an LDAPv3 compliant server.  The base package includes
the LDAP server and command line utilities for server administration.

--------------------------------------------------------------------------------
Update Information:

- 389-ds fixes an information disclosure during unsuccessful LDAP BIND
operation, CVE-2020-35518  - Dogtag PKI adopted to work with 389-ds with the fix
- FreeIPA rebuilt to require new Dogtag and 389-ds versions
--------------------------------------------------------------------------------
ChangeLog:

* Fri Feb 26 2021 Alexander Bokovoy  - 1.4.3.20-2
- Rebuild now that Dogtag is fixed to work with a fix to Issue 4609
* Fri Feb 12 2021 Mark Reynolds  - 1.4.3.20-1
- Bump version to 1.4.3.20
- Issue 4324 - Some architectures the cache line size file does not exist
- Issue 4593 - RFE - Print help when nsSSLPersonalitySSL is not found (#4614)
* Wed Feb 10 2021 Thierry Bordaz  - 1.4.3.19-1
- bump version to 1.4.3.19
- Issue 4609 - CVE - info disclosure when authenticating
- Issue 4581 - A failed re-indexing leaves the database in broken state (#4582)
- Issue 4579 - libasan detects heap-use-after-free in URP test (#4584)
- Issue 4563 - Failure on s390x: 'Fails to split RDN "o=pki-tomcat-CA" into components' (#4573)
- Issue 4526 - sync_repl: when completing an operation in the pending list, it can select the wrong operation (#4553)
- Issue 4324 - Performance search rate: change entry cache monitor to recursive pthread mutex (#4569)
- Issue 5442 - Search results are different between RHDS10 and RHDS11
- Issue 4548 - CLI - dsconf needs better root DN access control plugin validation
- Issue 4513 - Fix schema test and lib389 task module (#4514)
- Issue 4534 - libasan read buffer overflow in filtercmp (#4541)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1908653 - CVE-2020-35518 389-ds-base: information disclosure during the binding of a DN [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1908653
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-dc1a4934a5' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it.
To unsubscribe send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it.
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Advisories

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"42","type":"x","order":"1","pct":84,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"4","type":"x","order":"2","pct":8,"resources":[]},{"id":"181","title":"Hardly ever","votes":"4","type":"x","order":"3","pct":8,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.